TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data

作者: Jun Zhao , Qiben Yan , Jianxin Li , Minglai Shao , Zuti He

DOI: 10.1016/J.COSE.2020.101867

关键词:

摘要: … is to propose a novel method that can produce cyber threat intelligence (CTI) with domain … His current research interests include cyber threat intelligence, machine learning, and data …

参考文章(30)
Tudor Dumitras, Carl Sabottke, Octavian Suciu, Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits usenix security symposium. pp. 1041- 1056 ,(2015)
Yoon Kim, Convolutional Neural Networks for Sentence Classification empirical methods in natural language processing. pp. 1746- 1751 ,(2014) , 10.3115/V1/D14-1181
Zhiheng Huang, Kai Yu, Wei Xu, Bidirectional LSTM-CRF Models for Sequence Tagging arXiv: Computation and Language. ,(2015)
Roman Danyliw, Yuri Demchenko, Jan Meijer, The Incident Object Description Exchange Format RFC 5070 (Proposed Standard). ,vol. 5070, pp. 1- 92 ,(2007)
Christopher Spirito, Oscar Pastor Acosta, Sarah Brown, Emily Reid, Diego Fernandez Vazquez, Conceptual framework for cyber defense information sharing within trust relationships international conference on cyber conflict. pp. 1- 17 ,(2012)
Jon C. Haass, Gail-Joon Ahn, Frank Grimmelmann, ACTRA: A Case Study for Threat Information Sharing computer and communications security. pp. 23- 26 ,(2015) , 10.1145/2808128.2808135
Charles Zhechao Liu, Humayun Zafar, Yoris A. Au, Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector Communications of The Ais. ,vol. 34, pp. 15- 36 ,(2014) , 10.17705/1CAIS.03402
Joseph Sexton, Curtis Storlie, Joshua Neil, Attack chain detection Statistical Analysis and Data Mining. ,vol. 8, pp. 353- 363 ,(2015) , 10.1002/SAM.11296
Onur Catakoglu, Marco Balduzzi, Davide Balzarotti, Automatic Extraction of Indicators of Compromise for Web Applications the web conference. pp. 333- 343 ,(2016) , 10.1145/2872427.2883056
Florian Skopik, Giuseppe Settanni, Roman Fiedler, A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing Computers & Security. ,vol. 60, pp. 154- 176 ,(2016) , 10.1016/J.COSE.2016.04.003